A blog by Devendra Tewari
| Concern | Meaning | Mechanisms |
|---|---|---|
| Authenticity | Are you really who you say you are? | secret keys, biometrics |
| Confidentiality | Is information secure and privacy protected? | cryptography |
| Data Integrity | Can the data be changed or corrupted? | hashing |
| Access control | Will the information be accessed only by authorized parties? | access control lists, role based security |
| Availability | Will the information be available when needed? | disaster planning, recovering from crack attack, clustering, data backup/redundancy |
| Non repudiation | what is the proof of a digital transaction? | digital signatures |